The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a Heterogeneous distributed Environment, communication between the group members must be secured and authenticated. In a group, the member contribution in forming the group key is important. But forming a group key in a efficient manner is and to minimize the complexity in forming the group key, we are proposing a new protocol which consumes minimum number of key computations, less communication...
With the rapid and profound changes in computing technology, distributed computing, as an important branch of it, is becoming increasingly important, and gradually shifts from academia to specific areas of application. Currently, extensive researches on cloud computing, grid computing, large-scale E-Commerce web sites are all manifestations of a distributed system. Participating entities in a distributed...
Cloud computing becomes a hot research topic in the recent years. In the cloud computing, software applications and databases are moved to the centralized large data centers, which is called cloud. In the cloud, due to lack of physical possession of the data and the machine, the data and computation may not be well managed and fully trusted by cloud users. Existing work on cloud security mainly focuses...
The following topics are dealt with: signal processing; biomedical tutorial; mobile communication; wireless sensor networks; software architecture; system architecture; IT education; power system electronics; applied physics; transportation technology; multi-agent control system; biometrics; bioinformatics; biomedical applications; distributed computing; embedded system; design automation; electromechanical...
Based on the analysis of TrustGuard algorithm and the observation of malicious behaviors in distributed mail systems, we present MailTrust, a credibility-based reputation-generating algorithm, which is suitable for mail reputation system. It improves the credibility algorithm of TrustGuard and stores the credibility information of evaluation nodes at local, which aims to filter out dishonest feedbacks...
Much research aiming to design practical algorithms to support Byzantine Fault-Tolerant distributed applications has been made in recent years. These solutions are designed to make the applications resistant to successful attacks against the system, thereby making services tolerant to intrusions. Recently, some of these studies have considered the use of virtual machines for building a trusted computing...
This paper presents a DDoS (Distributed Denial of Service) two stage defense model based on roaming honeypot. The model can accurately identify the early features of DDoS attacks, and can automatically select effective detection features according to different types of DDoS attacks to accurately determine the legitimacy of IP flows with a smaller consumption, so that to a smaller consumption roam...
The credential collection method plays a vital role in automated trust negotiation (ATN) systems. Most existing work used the traditional trust negotiation method, which brings a much heavy burden to the credential server and causes blind credential fetching problem. This paper presents a distributed proving and negotiation (DPN) algorithm for trust management. DPN can intelligently carry out a remote...
The Italica Project is the implementation of an electronic health record system at the Italian Hospital of Buenos Aires. The present work shows the implementation of a medical signal grid repository module and its integration to the Italica Project. We also describe the architecture of that module and explain the design decisions taken for its construction. The integration to the preexisting system...
Due to the dynamic and anonymous nature of open environments, it is critically important for agents to identify trustful cooperators which work consistently as they claim. In the e-services and e-commerce communities, trust and reputation systems are applied broadly as one kind of decision support systems, and aim to cope with the consistency problems caused by uncertain trust relationships. However,...
An innovative mechanism of a file-backup system concept is proposed. In the proposed file backup mechanism, the combination of the following technologies such as a spatial random scrambling of file data, a subsequent random fragmentation of the file, the corresponding encryption and duplication for each fragmented one by using a stream cipher code in each encryption stage, and the corresponding notification...
Peer-to-Peer (P2P) has become a popular networking method which increases robustness and scalability. However, the distributed and decentralized P2P computing models have some serious security problems which may cause largescale Distributed Denial of Service (DDoS). This paper introduces the P2P system and the DDoS attacks in the particular networking environment. It also discusses the detection and...
Attacks are evolving towards exploiting network services' or applications' vulnerabilities, which results in more and more focus on security of distributed mission-critical system whose aim is to satisfy users' service requirements. According to the resource dependencies in networked system, a hierarchical security situational evaluation metric model (SHL model) for distributed mission-critical system...
Society has become so dependent on information systems that provide the information underpinnings for critical infrastructure applications. With the development of network technology, these systems continue to emerge and grow, and have become unbounded networked systems that are highly distributed. But traditional security technology is not sufficient to deal with the protection and survivability...
The distributed computing system researches are active in various areas. It is the system to perform the operation in the various areas, for example, science and art and cryptography. We present security mechanism consisted of three phases: the simple authentication, the strong authentication and the rapid authentication. Additionally we designed the mechanism of scheduling for multi-job operation...
In this paper we present empirical results and speculative analysis based on observations collected over a two month period from studies with two high interaction honeynets, deployed in a corporate and an SME (small to medium enterprise) environment, and a distributed honeypots deployment. All three networks contain a mixture of Windows and Linux hosts. We detail the architecture of the deployment...
The interest in system survivability under a variety of attacks, faults or accidents has been on the rise in recent years and survivability is receiving increasing attention as a key property of the mission critical system. Distributed systems are vital for all and it is a critical task to make such systems secure and survive. Survivability in the presence of attacks or failures depends on three key...
As opposed to centralized workflow management systems, the distributed execution of workflows can not rely on a trusted centralized point of coordination. As a result, basic security features including compliance of the overall sequence of workflow operations with the pre-defined workflow execution plan or traceability become critical issues that are yet to be addressed. Besides, the detection of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.